Blog

  1. January 28, 2015
    2014: A Year of Mega Breaches 2
    2014 will long be remembered for a series of mega security breaches and attacks starting with the Target breach in late 2013 and ending with Sony Pictures Entertainment. In...
  2. January 28, 2015
    Ponemon Institute Announces Results of 2014 Most Trusted Companies for Privacy Study
    In recognition of Data Privacy Day, Ponemon Institute is pleased to announce the results of the 2014 Most Trusted Companies for Privacy Study, an annual study that tracks c...
  3. January 28, 2015
    The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA
    Ponemon Institute is pleased to present the Open Source Collaboration Study conducted in the US & EMEA. The study found that overall, IT professionals' perceptions of c...
  4. January 26, 2015
    The Cost of Malware Containment
    Ponemon Institute is pleased to present the findings of The Cost of Malware Containment sponsored by Damballa. Ponemon Institute conducted this research to understand how m...
  5. January 22, 2015
    2014: A Year of Mega Breaches
    Ponemon Institute, with sponsorship from Identity Finder, conducted 2014: A Year of Mega Breaches to understand if and how organizations have changed their data protection ...
  6. January 14, 2015
    2015 State of the Endpoint Report: User-Centric Risk
    Ponemon Institute and Lumension are pleased to present the results from the 2015 State of the Endpoint Report: User-Centric Risk. The purpose of this study is to understand...
  7. December 9, 2014
    Corporate Data: A Protected Asset or a Ticking Time Bomb?
    In the pressure to be productive, many employees are putting confidential corporate information at risk. Is it possible to have both a productive workforce and a strong sec...
  8. October 30, 2014
    2014 Global Report on the Cost of Cyber Crime
    We are pleased to present the 2014 Global Report on the Cost of Cyber Crime. Sponsored by HP Enterprise Security, this year’s study is based upon a representative sam...
  9. October 29, 2014
    Security & Compliance Trends in Innovative Electronic Payments
    New electronic payment systems and virtual currencies are expected to make paper currency the horse and buggy of the 21st  century. Are organizations up to the challen...
  10. October 29, 2014
    The Importance of Senior Executive Involvement in Breach Response
    Ponemon Institute is pleased to present the results of The Importance of Senior Executive Involvement in Breach Response, sponsored by HP Enterprise Security Services. The ...
  11. September 29, 2014
    Security in the New Mobile Ecosystem
    Ponemon Institute and Raytheon are pleased to present the findings of Security in the New Mobile Ecosystem. The purpose of this research is to examine the impact of mobile ...
  12. September 15, 2014
    Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness
    With data breaches making headlines the world over, awareness about the importance of havingtechnologies and governance practices in place to respond to such incidents shou...
  13. July 30, 2014
    HSM Global Market Study
    Ponemon Institute is pleased to present the HSM Global Market Study sponsored by HP Atalla. The purpose of this research is to provide a competitive analysis of the hardwar...
  14. July 28, 2014
    The Imprivata Report on the Economic Impact of Inefficient Communications in Healthcare
    Efficient communication and collaboration amongst physicians, nurses and other providers is critical to the coordination and delivery of patient care, especially given the ...
  15. June 5, 2014
    Can a data breach in the cloud result in a larger and more costly incident?
    Can a data breach in the cloud result in a larger and more costly incident? Our latest study, Data Breach: The Cloud Multiplier Effect sponsored by Netskope reveals how the...
  16. June 2, 2014
    2014 Cost of Data Breach: United States
    IBM and Ponemon Institute are pleased to present the 2014 Cost of Data Breach Study: United States, our ninth annual benchmark study on the cost of data breach incidents fo...
  17. June 1, 2014
    2014 Cost of Data Breach: Global
    Ponemon Institute released its ninth annual Cost of Data Breach Study: Global Analysis, sponsored by IBM. According to the benchmark study of 314 companies spanning 10 coun...
  18. May 21, 2014
    Ponemon Institute and Raytheon Release New Study on the Insider Threat
    Well-publicized disclosures of highly sensitive information by wiki leaks and former NSA employee Edward Snowden have drawn attention and concern about the insider threat c...
  19. May 5, 2014
    Ponemon Institute Releases 2014 Cost of Data Breach: Global Analysis
    Throughout the world, companies are finding that data breaches have become as common as a cold but far more expensive to treat. With the exception of Germany, companies had...
  20. April 17, 2014
    Cyber Strategies for Endpoint Defense 2014
    Ponemon Institute is pleased to present the results of Cyber Strategies for Endpoint Defense 2014, sponsored by Avecto. The purpose of this research is to understand the st...
  21. April 16, 2014
    The Aftermath of a Data Breach: Consumer Sentiment
    Data breaches are in the headlines and on the minds of both businesses and consumers. While much of the dialog has been driven by companies that experienced a data breach, ...
  22. April 7, 2014
    The Cost of Insecure Mobile Devices in the Workplace
    Sponsored by AT&T, we are pleased to present the findings of The Cost of Insecure Mobile Devices in the Workplace. The study focuses on the risk created by employees&rs...
  23. March 26, 2014
    Fourth Annual Benchmark Study on Patient Privacy & Data Security
    The Fourth Annual Study on Patient Privacy & Data Security, sponsored by ID Experts, reveals new and expanded threats to the security and privacy of patient inform...
  24. March 14, 2014
    Unlocking the Mobile Security Potential: The Key to Effective Two-Factor Authentication
    An important security issue for many companies is the authentication of users using mobile devices for transactions. Unlocking the Mobile Security Potential: The Key to Eff...
  25. March 12, 2014
    Fourth Annual Benchmark Study on Patient Privacy and Data Security
    Today we are releasing our Fourth Annual Benchmark Study on Patient Privacy and Data Security. We hope you will read the report sponsored by ID Experts that reveals some fa...
Scroll to Top

Categories


Tags


Archive

20252020201920182017201620152014201320122011201020092008